VYPR
Medium severity4.3NVD Advisory· Published Dec 30, 2025· Updated Apr 27, 2026

CVE-2025-69012

CVE-2025-69012

Description

Missing Authorization vulnerability in Stephen Harris Event Organiser event-organiser allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Event Organiser: from n/a through <= 3.12.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Event Organiser up to 3.12.8 allows unprivileged users to exploit broken access controls.

Vulnerability

Overview CVE-2025-69012 is a missing authorization vulnerability in the WordPress plugin Event Organiser, affecting versions from n/a through 3.12.8. The root cause is an incorrectly configured access control security level, which means the plugin fails to properly verify that a user has the required permissions before allowing certain actions. This type of issue is classified as a broken access control vulnerability [1].

Attack

Vector and Prerequisites An attacker can exploit this flaw without needing any authentication, or with minimal privileges, due to the missing authorization check. The attack surface is the WordPress site running the vulnerable plugin, and the exploitation does not require any special network position—any unauthenticated or low-privileged user can potentially trigger the vulnerable function. The vulnerability is actively being used in mass-exploit campaigns targeting thousands of websites simultaneously [1].

Impact

A successful attack enables an unprivileged user to execute actions that should be restricted to higher-privileged roles, such as administrators. This could lead to unauthorized modifications of events, settings, or other data managed by the Event Organiser plugin. The CVSS score of 4.3 reflects a medium severity, indicating a tangible risk to site integrity and data confidentiality [1].

Mitigation

The vendor has patched this vulnerability in an update, so the immediate action is to update the Event Organiser plugin to a version later than 3.12.8. For those unable to update immediately, it is recommended to contact your hosting provider or web developer for assistance. Given its presence in mass-exploit campaigns, applying the patch promptly is critical [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.